메뉴 건너뛰기




Volumn 29, Issue 7, 2009, Pages 38-43

Power system vulnerability

Author keywords

Complex networks theory; Energy function; Power system vulnerability; Structural vulnerability; Voltage vulnerability; Vulnerability index

Indexed keywords

COMPLEX NETWORKS THEORY; ENERGY FUNCTION; POWER SYSTEM VULNERABILITY; STRUCTURAL VULNERABILITY; VOLTAGE VULNERABILITY; VULNERABILITY INDEX;

EID: 67651040222     PISSN: 10066047     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (31)

References (45)
  • 1
    • 67651017750 scopus 로고    scopus 로고
    • Chinese source
    • 2007.
    • (2007)
  • 2
    • 0022109771 scopus 로고
    • Dynamic security assessment utilizing the transient energy function method
    • EL-KADY M A, TANG C K, CARVALHO V F, et al. Dynamic security assessment utilizing the transient energy function method[J]. IEEE Transactions on Power Systems, 1984, 1(3): 284-291.
    • (1984) IEEE Transactions on Power Systems , vol.1 , Issue.3 , pp. 284-291
    • El-Kady, M.A.1    Tang, C.K.2    Carvalho, V.F.3
  • 3
    • 0028426229 scopus 로고
    • System vulnerability as a concept to assess power system dynamic security
    • FOUAD A A, ZHOU Qin, VITTTAL V. System vulnerability as a concept to assess power system dynamic security[J]. IEEE Transactions on Power Systems, 1994, 9(2): 1009-1015.
    • (1994) IEEE Transactions on Power Systems , vol.9 , Issue.2 , pp. 1009-1015
    • Fouad, A.A.1    Zhou, Q.2    Vitttal, V.3
  • 4
    • 33748885146 scopus 로고    scopus 로고
    • Vulnerability assessment and survey program-overview of assessment methodology
    • U. S. Department of Energy Office of Energy Assurance
    • U. S. Department of Energy Office of Energy Assurance. Vulnerability assessment and survey program-overview of assessment methodology[EB/OL]. (2001-09-28). http://www.Esisac.com/publicdocs/assessment_methods/ OEA_VA_Methodology.pdf.
    • (2001)
  • 5
    • 21244485295 scopus 로고    scopus 로고
    • Draft: Vulnerability assessment methodology-electric power infrastructure
    • U. S. Department of Energy Office of Energy Assurance
    • U. S. Department of Energy Office of Energy Assurance. Draft: vulnerability assessment methodology-electric power infrastructure[EB/OL]. (2002-09-30). http://www.Esisac.com/publicdocs/assessment_methods/ OEA_VA_Methodology.pdf.
    • (2002)
  • 6
    • 0028369620 scopus 로고
    • Application of artificial neural networks in power system security and vulnerability assessment
    • ZHOU Qin, DAVIDSON J, FOUAD A A. Application of artificial neural networks in power system security and vulnerability assessment[J]. IEEE Transactions on Power Systems, 1994, 9(1): 525-532.
    • (1994) IEEE Transactions on Power Systems , vol.9 , Issue.1 , pp. 525-532
    • Zhou, Q.1    Davidson, J.2    Fouad, A.A.3
  • 7
    • 51349109075 scopus 로고    scopus 로고
    • Power system voltage stability and its present investigation (II)
    • SU Yongchun, CHENG Shijie, WEN Jingyu, et al. Power system voltage stability and its present investigation (II)[J]. Electric Power Automation Equipment, 2006, 26(7): 97-100.
    • (2006) Electric Power Automation Equipment , vol.26 , Issue.7 , pp. 97-100
    • Su, Y.1    Cheng, S.2    Wen, J.3
  • 9
    • 0025423396 scopus 로고
    • An energy based security measure for assessing vulnerability to voltage collapse
    • DEMARCO C L, QVERBYE T J. An energy based security measure for assessing vulnerability to voltage collapse[J]. IEEE Transactions on Power Systems, 1990, 5(2): 419-427.
    • (1990) IEEE Transactions on Power Systems , vol.5 , Issue.2 , pp. 419-427
    • Demarco, C.L.1    Qverbye, T.J.2
  • 10
    • 50049104676 scopus 로고    scopus 로고
    • Quantification index of voltage stability based on energy information
    • LIU Qunying, LIU Junyong, LIU Qifang. Quantification index of voltage stability based on energy information[J]. Electric Power Automation Equipment, 2008, 28(8): 8-13.
    • (2008) Electric Power Automation Equipment , vol.28 , Issue.8 , pp. 8-13
    • Liu, Q.1    Liu, J.2    Liu, Q.3
  • 11
    • 0026203133 scopus 로고
    • Voltage security enhancement using energy based sensitivities
    • OVERBYE T J, DEMARCO C L. Voltage security enhancement using energy based sensitivities[J]. IEEE Transactions on Power Systems, 1991, 6(3): 1196-1202.
    • (1991) IEEE Transactions on Power Systems , vol.6 , Issue.3 , pp. 1196-1202
    • Overbye, T.J.1    Demarco, C.L.2
  • 13
    • 0037672425 scopus 로고    scopus 로고
    • Improving voltage security assessment and ranking vulnerable buses with consideration of power system limits
    • AMJA N, ESMAILI M. Improving voltage security assessment and ranking vulnerable buses with consideration of power system limits[J]. Electrical Power and Energy Systems, 2003, 25(9): 705-715.
    • (2003) Electrical Power and Energy Systems , vol.25 , Issue.9 , pp. 705-715
    • Amja, N.1    Esmaili, M.2
  • 15
    • 60949089689 scopus 로고    scopus 로고
    • Transient security risk assessment of power system based on risk theory and fuzzy reasoning
    • LIU Xindong, JIANG Quanyuan, CAO Yijia, et al. Transient security risk assessment of power system based on risk theory and fuzzy reasoning[J]. Electric Power Automation Equipment, 2009, 29(2): 15-20.
    • (2009) Electric Power Automation Equipment , vol.29 , Issue.2 , pp. 15-20
    • Liu, X.1    Jiang, Q.2    Cao, Y.3
  • 16
    • 33947683332 scopus 로고    scopus 로고
    • A new analysis method for early detection and prevention of cascading events
    • SONG Hongbiao, MLADEN K. A new analysis method for early detection and prevention of cascading events[J]. Electric Power Systems Research, 2006, 77(8): 1132-1142.
    • (2006) Electric Power Systems Research , vol.77 , Issue.8 , pp. 1132-1142
    • Song, H.1    Mladen, K.2
  • 17
    • 47949102947 scopus 로고    scopus 로고
    • Contingency assessment for voltage dip and short term voltage stability analysis
    • Charleston, USA
    • TIWARI A, AJJARAPU V. Contingency assessment for voltage dip and short term voltage stability analysis[C]//2007 IREP Symposium. Charleston, USA:[s.n.], 2007: 1-8.
    • (2007) 2007 IREP Symposium , pp. 1-8
    • Tiwari, A.1    Ajjarapu, V.2
  • 18
    • 2942587343 scopus 로고    scopus 로고
    • Transition to chaos in complex dynamical networks
    • LI Xiang, CHEN Guanrong, KO Kingtim. Transition to chaos in complex dynamical networks[J]. Physica A, 2004, 338(3/4): 367-378.
    • (2004) Physica A , vol.338 , Issue.3-4 , pp. 367-378
    • Li, X.1    Chen, G.2    Ko, K.3
  • 19
    • 40249092935 scopus 로고    scopus 로고
    • Transition to chaos in small-world dynamical network
    • YUAN Wujie, LUO Xiaoshu, JIANG Pinqin, et al. Transition to chaos in small-world dynamical network[J]. Chaos, Solitons and Fractals, 2008, 37(3): 799-806.
    • (2008) Chaos, Solitons and Fractals , vol.37 , Issue.3 , pp. 799-806
    • Yuan, W.1    Luo, X.2    Jiang, P.3
  • 20
    • 0034721164 scopus 로고    scopus 로고
    • Error and attack tolerance of complex networks
    • ALBERT R, JEONG H, BARABASI A. Error and attack tolerance of complex networks[J]. Nature, 2000, 406(6794): 378-382.
    • (2000) Nature , vol.406 , Issue.6794 , pp. 378-382
    • Albert, R.1    Jeong, H.2    Barabasi, A.3
  • 21
    • 6444241717 scopus 로고    scopus 로고
    • Tolerance of scale-free networks: From friendly to intentional attack strategies
    • GALLOS L K, ARGYRAKIS P, BUNDE A, et al. Tolerance of scale-free networks: from friendly to intentional attack strategies[J]. Physical A, 2004, 344(3/4): 504-509.
    • (2004) Physical A , vol.344 , Issue.3-4 , pp. 504-509
    • Gallos, L.K.1    Argyrakis, P.2    Bunde, A.3
  • 22
    • 42749103823 scopus 로고    scopus 로고
    • Structural vulnerability of North American Power Grid
    • ALBERT R, ALBERT I, NAKARADO G L. Structural vulnerability of North American Power Grid[J]. Physical Review E, 2004(69): 1-4.
    • (2004) Physical Review E , Issue.69 , pp. 1-4
    • Albert, R.1    Albert, I.2    Nakarado, G.L.3
  • 23
    • 0032482432 scopus 로고    scopus 로고
    • Collective dynamics of 'small-world' networks
    • WATTS D J, STROGATZ S H. Collective dynamics of 'small-world' networks[J]. Nature, 1998, 393(6684): 440-442.
    • (1998) Nature , vol.393 , Issue.6684 , pp. 440-442
    • Watts, D.J.1    Strogatz, S.H.2
  • 24
    • 0042855693 scopus 로고    scopus 로고
    • An experimental study of search in global social networks
    • DODDS P S, MUHAMAD R, WATTS D J. An experimental study of search in global social networks[J]. Science, 2003, 301(5634): 827-829.
    • (2003) Science , vol.301 , Issue.5634 , pp. 827-829
    • Dodds, P.S.1    Muhamad, R.2    Watts, D.J.3
  • 25
    • 22744442888 scopus 로고    scopus 로고
    • Small-worlds: The dynamics of between order and randomness
    • WATTS D J. Small-worlds: the dynamics of between order and randomness[J]. The American Mathematical Monthly, 2000, 107(7): 664-668.
    • (2000) The American Mathematical Monthly , vol.107 , Issue.7 , pp. 664-668
    • Watts, D.J.1
  • 26
    • 59949094203 scopus 로고    scopus 로고
    • Temporal and spatial evolvement model of power grid
    • CAO Yijia, WANG Guangzeng, BAO Zhejing, et al. Temporal and spatial evolvement model of power grid[J]. Electric Power Automation Equipment, 2009, 29(1): 1-5.
    • (2009) Electric Power Automation Equipment , vol.29 , Issue.1 , pp. 1-5
    • Cao, Y.1    Wang, G.2    Bao, Z.3
  • 28
    • 33745167290 scopus 로고    scopus 로고
    • Small-world topological model based vulnerability assessment algorithm for large-scale power grid
    • DING Ming, HAN Pingping. Small-world topological model based vulnerability assessment algorithm for large-scale power grid[J]. Automation of Electric Power Systems, 2006, 30(8): 7-11.
    • (2006) Automation of Electric Power Systems , vol.30 , Issue.8 , pp. 7-11
    • Ding, M.1    Han, P.2
  • 30
    • 9244246297 scopus 로고    scopus 로고
    • A practical approach for integrated power system vulnerability analysis with protection failures
    • YU Xingbin, SINGH Chanan. A practical approach for integrated power system vulnerability analysis with protection failures[J]. IEEE Transmissions on Power Systems, 2004, 19(4): 1811-1820.
    • (2004) IEEE Transmissions on Power Systems , vol.19 , Issue.4 , pp. 1811-1820
    • Yu, X.1    Singh, C.2
  • 32
    • 0031612513 scopus 로고    scopus 로고
    • An importance sampling application; 179 bus WSCC system under voltage based hidden failures and relay misoperation
    • Hawaii, USA
    • BAE K, THORP J S. An importance sampling application; 179 bus WSCC system under voltage based hidden failures and relay misoperation[C]//The 31st International Conference on System Science. Hawaii, USA:[s.n.], 1998: 39-46.
    • (1998) The 31st International Conference on System Science , pp. 39-46
    • Bae, K.1    Thorp, J.S.2
  • 33
    • 35348812520 scopus 로고    scopus 로고
    • Electric power grid structural vulnerability assessment
    • Montreal, Canada
    • MAO Anjia, YU Jiaxi, GUO Zhizhong. Electric power grid structural vulnerability assessment[C]//Power Engineering Society General Meeting. Montreal, Canada:[s.n.], 2006: 1-6.
    • (2006) Power Engineering Society General Meeting , pp. 1-6
    • Mao, A.1    Yu, J.2    Guo, Z.3
  • 34
    • 33846079797 scopus 로고    scopus 로고
    • Identification of vulnerability lines in power grid based on complex network theory
    • CAO Yijia, CHEN Xiaogang, SUN Ke. Identification of vulnerability lines in power grid based on complex network theory[J]. Electric Power Automation Equipment, 2006, 26(12): 1-5.
    • (2006) Electric Power Automation Equipment , vol.26 , Issue.12 , pp. 1-5
    • Cao, Y.1    Chen, X.2    Sun, K.3
  • 35
    • 42549168426 scopus 로고    scopus 로고
    • Identification of vulnerable lines in power grid based on complex network theory
    • Florida, USA
    • CHEN Xiaogang, SUN Ke, CAO Yijia, et al. Identification of vulnerable lines in power grid based on complex network theory[C]//Power Engineering Society General Meeting. Florida, USA:[s.n.], 2007: 1-6.
    • (2007) Power Engineering Society General Meeting , pp. 1-6
    • Chen, X.1    Sun, K.2    Cao, Y.3
  • 37
    • 22744442444 scopus 로고    scopus 로고
    • Review on models of cascading failure in complex power grid
    • SUN Ke, HAN Zhenxiang, CAO Yijia. Review on models of cascading failure in complex power grid[J]. Power System Technology, 2004, 29(13): 1-9.
    • (2004) Power System Technology , vol.29 , Issue.13 , pp. 1-9
    • Sun, K.1    Han, Z.2    Cao, Y.3
  • 38
    • 33846157709 scopus 로고    scopus 로고
    • Review of cascading failures in electric power network
    • ZHAN Yong, CHENG Haozhong, XIONG Hugang. Review of cascading failures in electric power network[J]. Electric Power Automation Equipment, 2005, 25(9): 93-98.
    • (2005) Electric Power Automation Equipment , vol.25 , Issue.9 , pp. 93-98
    • Zhan, Y.1    Cheng, H.2    Xiong, H.3
  • 39
    • 39749099884 scopus 로고    scopus 로고
    • Structural vulnerability analysis of large power grid based on complex network theory
    • CHEN Xiaogang, SUN Ke, CAO Yijia. Structural vulnerability analysis of large power grid based on complex network theory[J]. Transactions of China Electrotechnical Society, 2007, 22(10): 138-143.
    • (2007) Transactions of China Electrotechnical Society , vol.22 , Issue.10 , pp. 138-143
    • Chen, X.1    Sun, K.2    Cao, Y.3
  • 40
    • 54549125777 scopus 로고    scopus 로고
    • Power system intelligent dispatch
    • AI Lin, HUA Dong. Power system intelligent dispatch[J]. Electric Power Automation Equipment, 2008, 28(10): 83-87.
    • (2008) Electric Power Automation Equipment , vol.28 , Issue.10 , pp. 83-87
    • Ai, L.1    Hua, D.2
  • 41
    • 0035791838 scopus 로고    scopus 로고
    • Multi-agent technology for vulnerability assessment and control
    • Seattle, USA
    • JUNG Juhwan, LIU Chenching. Multi-agent technology for vulnerability assessment and control[C]//Power Engineering Society Summer Meeting. Seattle, USA:[s.n.], 2001: 1287-1292.
    • (2001) Power Engineering Society Summer Meeting , pp. 1287-1292
    • Jung, J.1    Liu, C.2
  • 42
    • 26244452473 scopus 로고    scopus 로고
    • Security and vulnerability in electric power systems
    • Missouri, USA
    • WATTS D. Security and vulnerability in electric power systems[C]//The 35th North American Power Symposium. Missouri, USA:[s.n.], 2003: 559-566.
    • (2003) The 35th North American Power Symposium , pp. 559-566
    • Watts, D.1
  • 43
    • 0037002089 scopus 로고    scopus 로고
    • Security challenges for the electricity infrastructure (supplement to computer magazine)
    • MASSOUD A. Security challenges for the electricity infrastructure (supplement to computer magazine)[J]. Electric Power Research Institute, 2002, 35(4): 8-10.
    • (2002) Electric Power Research Institute , vol.35 , Issue.4 , pp. 8-10
    • Massoud, A.1
  • 44
    • 67651064508 scopus 로고    scopus 로고
    • Vulnerability assessment of cyber security in power industry
    • Atlanta, USA
    • YU Jiaxi, MAO Anjia, GUO Zhizhong. Vulnerability assessment of cyber security in power industry[C]//Power Systems Conference and Exposition, 2006. Atlanta, USA:[s.n.], 2006: 2200-2205.
    • (2006) Power Systems Conference and Exposition, 2006 , pp. 2200-2205
    • Yu, J.1    Mao, A.2    Guo, Z.3
  • 45
    • 49649113049 scopus 로고    scopus 로고
    • Preliminary research on vulnerability evaluation and safeguard of power system under external force harassment
    • WANG Peng, XU Dongjie, WANG Xuedong, et al. Preliminary research on vulnerability evaluation and safeguard of power system under external force harassment[J]. Journal of North China Electric Power University, 2005, 32(1): 14-18.
    • (2005) Journal of North China Electric Power University , vol.32 , Issue.1 , pp. 14-18
    • Wang, P.1    Xu, D.2    Wang, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.